gss_krb5_crypto.c 9.7 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
/*
 *  linux/net/sunrpc/gss_krb5_crypto.c
 *
 *  Copyright (c) 2000 The Regents of the University of Michigan.
 *  All rights reserved.
 *
 *  Andy Adamson   <andros@umich.edu>
 *  Bruce Fields   <bfields@umich.edu>
 */

/*
 * Copyright (C) 1998 by the FundsXpress, INC.
 *
 * All rights reserved.
 *
 * Export of this software from the United States of America may require
 * a specific license from the United States Government.  It is the
 * responsibility of any person or organization contemplating export to
 * obtain such a license before exporting.
 *
 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
 * distribute this software and its documentation for any purpose and
 * without fee is hereby granted, provided that the above copyright
 * notice appear in all copies and that both that copyright notice and
 * this permission notice appear in supporting documentation, and that
 * the name of FundsXpress. not be used in advertising or publicity pertaining
 * to distribution of the software without specific, written prior
 * permission.  FundsXpress makes no representations about the suitability of
 * this software for any purpose.  It is provided "as is" without express
 * or implied warranty.
 *
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */

#include <linux/types.h>
#include <linux/mm.h>
#include <linux/slab.h>
40
#include <linux/scatterlist.h>
L
Linus Torvalds 已提交
41 42 43 44 45 46 47 48 49 50 51
#include <linux/crypto.h>
#include <linux/highmem.h>
#include <linux/pagemap.h>
#include <linux/sunrpc/gss_krb5.h>

#ifdef RPC_DEBUG
# define RPCDBG_FACILITY        RPCDBG_AUTH
#endif

u32
krb5_encrypt(
52
	struct crypto_blkcipher *tfm,
L
Linus Torvalds 已提交
53 54 55 56 57 58 59 60
	void * iv,
	void * in,
	void * out,
	int length)
{
	u32 ret = -EINVAL;
        struct scatterlist sg[1];
	u8 local_iv[16] = {0};
61
	struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
L
Linus Torvalds 已提交
62 63 64 65

	dprintk("RPC:      krb5_encrypt: input data:\n");
	print_hexl((u32 *)in, length, 0);

66
	if (length % crypto_blkcipher_blocksize(tfm) != 0)
L
Linus Torvalds 已提交
67 68
		goto out;

69
	if (crypto_blkcipher_ivsize(tfm) > 16) {
L
Linus Torvalds 已提交
70
		dprintk("RPC:      gss_k5encrypt: tfm iv size to large %d\n",
71
		         crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
72 73 74 75
		goto out;
	}

	if (iv)
76
		memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
77 78

	memcpy(out, in, length);
79
	sg_set_buf(sg, out, length);
L
Linus Torvalds 已提交
80

81
	ret = crypto_blkcipher_encrypt_iv(&desc, sg, sg, length);
L
Linus Torvalds 已提交
82 83 84 85 86 87 88 89 90 91 92 93

	dprintk("RPC:      krb5_encrypt: output data:\n");
	print_hexl((u32 *)out, length, 0);
out:
	dprintk("RPC:      krb5_encrypt returns %d\n",ret);
	return(ret);
}

EXPORT_SYMBOL(krb5_encrypt);

u32
krb5_decrypt(
94
     struct crypto_blkcipher *tfm,
L
Linus Torvalds 已提交
95 96 97 98 99 100 101 102
     void * iv,
     void * in,
     void * out,
     int length)
{
	u32 ret = -EINVAL;
	struct scatterlist sg[1];
	u8 local_iv[16] = {0};
103
	struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
L
Linus Torvalds 已提交
104 105 106 107

	dprintk("RPC:      krb5_decrypt: input data:\n");
	print_hexl((u32 *)in, length, 0);

108
	if (length % crypto_blkcipher_blocksize(tfm) != 0)
L
Linus Torvalds 已提交
109 110
		goto out;

111
	if (crypto_blkcipher_ivsize(tfm) > 16) {
L
Linus Torvalds 已提交
112
		dprintk("RPC:      gss_k5decrypt: tfm iv size to large %d\n",
113
			crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
114 115 116
		goto out;
	}
	if (iv)
117
		memcpy(local_iv,iv, crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
118 119

	memcpy(out, in, length);
120
	sg_set_buf(sg, out, length);
L
Linus Torvalds 已提交
121

122
	ret = crypto_blkcipher_decrypt_iv(&desc, sg, sg, length);
L
Linus Torvalds 已提交
123 124 125 126 127 128 129 130 131 132

	dprintk("RPC:      krb5_decrypt: output_data:\n");
	print_hexl((u32 *)out, length, 0);
out:
	dprintk("RPC:      gss_k5decrypt returns %d\n",ret);
	return(ret);
}

EXPORT_SYMBOL(krb5_decrypt);

133 134 135 136 137 138 139 140 141 142 143 144 145
static int
process_xdr_buf(struct xdr_buf *buf, int offset, int len,
		int (*actor)(struct scatterlist *, void *), void *data)
{
	int i, page_len, thislen, page_offset, ret = 0;
	struct scatterlist	sg[1];

	if (offset >= buf->head[0].iov_len) {
		offset -= buf->head[0].iov_len;
	} else {
		thislen = buf->head[0].iov_len - offset;
		if (thislen > len)
			thislen = len;
146
		sg_set_buf(sg, buf->head[0].iov_base + offset, thislen);
147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
		ret = actor(sg, data);
		if (ret)
			goto out;
		offset = 0;
		len -= thislen;
	}
	if (len == 0)
		goto out;

	if (offset >= buf->page_len) {
		offset -= buf->page_len;
	} else {
		page_len = buf->page_len - offset;
		if (page_len > len)
			page_len = len;
		len -= page_len;
		page_offset = (offset + buf->page_base) & (PAGE_CACHE_SIZE - 1);
		i = (offset + buf->page_base) >> PAGE_CACHE_SHIFT;
		thislen = PAGE_CACHE_SIZE - page_offset;
		do {
			if (thislen > page_len)
				thislen = page_len;
			sg->page = buf->pages[i];
			sg->offset = page_offset;
			sg->length = thislen;
			ret = actor(sg, data);
			if (ret)
				goto out;
			page_len -= thislen;
			i++;
			page_offset = 0;
			thislen = PAGE_CACHE_SIZE;
		} while (page_len != 0);
		offset = 0;
	}
	if (len == 0)
		goto out;

	if (offset < buf->tail[0].iov_len) {
		thislen = buf->tail[0].iov_len - offset;
		if (thislen > len)
			thislen = len;
189
		sg_set_buf(sg, buf->tail[0].iov_base + offset, thislen);
190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208
		ret = actor(sg, data);
		len -= thislen;
	}
	if (len != 0)
		ret = -EINVAL;
out:
	return ret;
}

static int
checksummer(struct scatterlist *sg, void *data)
{
	struct crypto_tfm *tfm = (struct crypto_tfm *)data;

	crypto_digest_update(tfm, sg, 1);

	return 0;
}

L
Linus Torvalds 已提交
209 210 211
/* checksum the plaintext data and hdrlen bytes of the token header */
s32
make_checksum(s32 cksumtype, char *header, int hdrlen, struct xdr_buf *body,
212
		   int body_offset, struct xdr_netobj *cksum)
L
Linus Torvalds 已提交
213 214 215 216 217 218 219 220 221 222 223 224
{
	char                            *cksumname;
	struct crypto_tfm               *tfm = NULL; /* XXX add to ctx? */
	struct scatterlist              sg[1];

	switch (cksumtype) {
		case CKSUMTYPE_RSA_MD5:
			cksumname = "md5";
			break;
		default:
			dprintk("RPC:      krb5_make_checksum:"
				" unsupported checksum %d", cksumtype);
225
			return GSS_S_FAILURE;
L
Linus Torvalds 已提交
226
	}
227
	if (!(tfm = crypto_alloc_tfm(cksumname, CRYPTO_TFM_REQ_MAY_SLEEP)))
228
		return GSS_S_FAILURE;
L
Linus Torvalds 已提交
229 230 231
	cksum->len = crypto_tfm_alg_digestsize(tfm);

	crypto_digest_init(tfm);
232
	sg_set_buf(sg, header, hdrlen);
L
Linus Torvalds 已提交
233
	crypto_digest_update(tfm, sg, 1);
234 235
	process_xdr_buf(body, body_offset, body->len - body_offset,
			checksummer, tfm);
L
Linus Torvalds 已提交
236
	crypto_digest_final(tfm, cksum->data);
237
	crypto_free_tfm(tfm);
238
	return 0;
L
Linus Torvalds 已提交
239 240 241
}

EXPORT_SYMBOL(make_checksum);
242 243 244

struct encryptor_desc {
	u8 iv[8]; /* XXX hard-coded blocksize */
245
	struct blkcipher_desc desc;
246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289
	int pos;
	struct xdr_buf *outbuf;
	struct page **pages;
	struct scatterlist infrags[4];
	struct scatterlist outfrags[4];
	int fragno;
	int fraglen;
};

static int
encryptor(struct scatterlist *sg, void *data)
{
	struct encryptor_desc *desc = data;
	struct xdr_buf *outbuf = desc->outbuf;
	struct page *in_page;
	int thislen = desc->fraglen + sg->length;
	int fraglen, ret;
	int page_pos;

	/* Worst case is 4 fragments: head, end of page 1, start
	 * of page 2, tail.  Anything more is a bug. */
	BUG_ON(desc->fragno > 3);
	desc->infrags[desc->fragno] = *sg;
	desc->outfrags[desc->fragno] = *sg;

	page_pos = desc->pos - outbuf->head[0].iov_len;
	if (page_pos >= 0 && page_pos < outbuf->page_len) {
		/* pages are not in place: */
		int i = (page_pos + outbuf->page_base) >> PAGE_CACHE_SHIFT;
		in_page = desc->pages[i];
	} else {
		in_page = sg->page;
	}
	desc->infrags[desc->fragno].page = in_page;
	desc->fragno++;
	desc->fraglen += sg->length;
	desc->pos += sg->length;

	fraglen = thislen & 7; /* XXX hardcoded blocksize */
	thislen -= fraglen;

	if (thislen == 0)
		return 0;

290 291
	ret = crypto_blkcipher_encrypt_iv(&desc->desc, desc->outfrags,
					  desc->infrags, thislen);
292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309
	if (ret)
		return ret;
	if (fraglen) {
		desc->outfrags[0].page = sg->page;
		desc->outfrags[0].offset = sg->offset + sg->length - fraglen;
		desc->outfrags[0].length = fraglen;
		desc->infrags[0] = desc->outfrags[0];
		desc->infrags[0].page = in_page;
		desc->fragno = 1;
		desc->fraglen = fraglen;
	} else {
		desc->fragno = 0;
		desc->fraglen = 0;
	}
	return 0;
}

int
310 311
gss_encrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
		    int offset, struct page **pages)
312 313 314 315
{
	int ret;
	struct encryptor_desc desc;

316
	BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
317 318

	memset(desc.iv, 0, sizeof(desc.iv));
319 320 321
	desc.desc.tfm = tfm;
	desc.desc.info = desc.iv;
	desc.desc.flags = 0;
322 323 324 325 326 327 328 329 330 331 332 333 334 335
	desc.pos = offset;
	desc.outbuf = buf;
	desc.pages = pages;
	desc.fragno = 0;
	desc.fraglen = 0;

	ret = process_xdr_buf(buf, offset, buf->len - offset, encryptor, &desc);
	return ret;
}

EXPORT_SYMBOL(gss_encrypt_xdr_buf);

struct decryptor_desc {
	u8 iv[8]; /* XXX hard-coded blocksize */
336
	struct blkcipher_desc desc;
337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
	struct scatterlist frags[4];
	int fragno;
	int fraglen;
};

static int
decryptor(struct scatterlist *sg, void *data)
{
	struct decryptor_desc *desc = data;
	int thislen = desc->fraglen + sg->length;
	int fraglen, ret;

	/* Worst case is 4 fragments: head, end of page 1, start
	 * of page 2, tail.  Anything more is a bug. */
	BUG_ON(desc->fragno > 3);
	desc->frags[desc->fragno] = *sg;
	desc->fragno++;
	desc->fraglen += sg->length;

	fraglen = thislen & 7; /* XXX hardcoded blocksize */
	thislen -= fraglen;

	if (thislen == 0)
		return 0;

362 363
	ret = crypto_blkcipher_decrypt_iv(&desc->desc, desc->frags,
					  desc->frags, thislen);
364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379
	if (ret)
		return ret;
	if (fraglen) {
		desc->frags[0].page = sg->page;
		desc->frags[0].offset = sg->offset + sg->length - fraglen;
		desc->frags[0].length = fraglen;
		desc->fragno = 1;
		desc->fraglen = fraglen;
	} else {
		desc->fragno = 0;
		desc->fraglen = 0;
	}
	return 0;
}

int
380 381
gss_decrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
		    int offset)
382 383 384 385
{
	struct decryptor_desc desc;

	/* XXXJBF: */
386
	BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
387 388

	memset(desc.iv, 0, sizeof(desc.iv));
389 390 391
	desc.desc.tfm = tfm;
	desc.desc.info = desc.iv;
	desc.desc.flags = 0;
392 393 394 395 396 397
	desc.fragno = 0;
	desc.fraglen = 0;
	return process_xdr_buf(buf, offset, buf->len - offset, decryptor, &desc);
}

EXPORT_SYMBOL(gss_decrypt_xdr_buf);